Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,906 Hits in 4.7 sec

A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking [article]

Zhenbang Li, Yaya Shi, Jin Gao, Shaoru Wang, Bing Li, Pengpeng Liang, Weiming Hu
2021 arXiv   pre-print
However, the existing attack methods craft the perturbations for each video independently, which comes at a non-negligible computational cost.  ...  Specifically, we attack a tracker by adding a universal imperceptible perturbation to the template image and adding a fake target, i.e., a small universal adversarial patch, into the search images adhering  ...  ACKNOWLEDGMENTS The authors would like to thank the reviewers for their constructive comments and suggestions.  ... 
arXiv:2105.02480v3 fatcat:3so53oag6nhbtfeusiybagfla4

An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks [article]

Khan Muhammad, Zahoor Jan, Jamil Ahmad, Zahid Khan
2015 arXiv   pre-print
The proposed method encrypts the sensitive captured data of sensor nodes using various encryption procedures (bitxor operation, bits shuffling, and secret key based encryption) and then sends it to the  ...  This paper presents an adaptive cryptographic scheme for secure transmission of various sensitive parameters, sensed by wireless sensors to the fusion center for further processing in WSNs such as military  ...  network security in WSN Ø Localization of sensors based on images Ø Coverage of object view-angle using visual sensor networks Ø Object tracking using sensor image processing Ø Aggregation of images in  ... 
arXiv:1510.00226v1 fatcat:ydwocbg5sbe7ngqrnmwlfnidju

ReconViguRation: Reconfiguring Physical Keyboards in Virtual Reality [article]

Daniel Schneider, Alexander Otte, Travis Gesslein, Philipp Gagel, Bastian Kuth, Mohamad Shahm Damlakhi, Oliver Dietz, Eyal Ofek, Michel Pahud, Per Ola Kristensson, Jörg Müller, Jens Grubert
2019 arXiv   pre-print
Physical keyboards are common peripherals for personal computers and are efficient standard text entry devices.  ...  This allows individual physical keys to be reconfigured to the same or different actions and visual output to be distributed in various ways across the VR representation of the keyboard.  ...  [35] for hand tracking on physical keyboards.  ... 
arXiv:1907.08153v1 fatcat:xp22hsnpbjecncidbdcb64az7q

Enhancement Digital Forensic Approach for Inter-Frame Video Forgery Detection Using a Deep Learning Technique

Mohammed R. Oraibi, Abdulkareem M. Radhi
2022 Iraqi Journal of Science  
Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media.  ...  It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling.  ...  These attacks primarily affect the time sequence of the visual information collected by the system. Common attacks are frame insertion, frame deletion, frame duplication, frame shuffling [23] .  ... 
doi:10.24996/ijs.2022.63.6.34 fatcat:enyogot3izdpjfiuiam2oscvuy

A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations

Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad, Sadaqat Ur Rehman, Sana Ullah Jan, Abdullah Qayyum, William J. Buchanan
2021 Wireless personal communications  
The efficiency of the proposed system is proved in terms of histogram analysis, adjacent pixels correlation analysis, contrast analysis, homogeneity analysis, energy analysis, NIST analysis, mean square  ...  The experimental results show that the proposed cryptosystem is a lightweight approach that can achieve the desired security level for encrypting confidential image-based patients' information.  ...  in track associated with a zig-zag motion.  ... 
doi:10.1007/s11277-021-08584-z fatcat:r6elxupxlnapdmunh7l4bu42ti

Visual prototypes in the ventral stream are attuned to complexity and gaze behavior

Olivia Rose, James Johnson, Binxu Wang, Carlos R. Ponce
2021 Nature Communications  
This suggests the code for object recognition represents compressed features of behavioral relevance, an underexplored aspect of efficient coding.  ...  AbstractEarly theories of efficient coding suggested the visual system could compress the world by learning to represent features where information was concentrated, such as contours.  ...  Acknowledgements We thank Mary Burkemper for technical help collecting the data and Richard T. Born for comments on the manuscript.  ... 
doi:10.1038/s41467-021-27027-8 pmid:34795262 pmcid:PMC8602238 fatcat:bdwhku4ruzhgxna5alipg4yi7u

Event Encryption for Neuromorphic Vision Sensors: Framework, Algorithm, and Evaluation

Bowen Du, Weiqi Li, Zeju Wang, Manxin Xu, Tianchen Gao, Jiajie Li, Hongkai Wen
2021 Sensors  
In addition, an updating score has been designed for controlling the frequency of execution, which supports efficient encryption on different platforms.  ...  We firstly analyze the possible security attacks to NVS, including grayscale image reconstruction and privacy-related classification.  ...  Secondly, we have proposed and designed an efficient encryption framework for protecting NVS data against visualization and recognition attacks.  ... 
doi:10.3390/s21134320 pmid:34202626 pmcid:PMC8272045 fatcat:eutwbh2tmnaztne7l4gauryytq

A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping

Jawad Ahmad Fawad Masood, Syed Aziz Shah, Sajjad Shaukat Jamal, Iqtadar Hussain
2020 Symmetry  
For pixel encryption, Intertwining and Chebyshev maps were employed in confusion and diffusion processes, respectively.  ...  Due to interrupted real-time continuous monitoring capabilities of state-of-the-art cameras, a vision-based system can be easily deployed for occupancy monitoring.  ...  Acknowledgments: The author Sajjad Shaukat Jamal extend his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant  ... 
doi:10.3390/sym12030350 fatcat:qqdteh3eszbf3jef7xm7dr4qp4

Encrypting Image based on Chaotic Map algorithm

Zahraa Salah Dhaief, Dena Nadir George, Raniah Ali Mustafa
2021 International Journal of Engineering Research and Advanced Technology  
map for shuffling the image pixels positions; also baker map is used to decomposed Image into four rectangles and shuffle them.  ...  Also, the experimental results utilizing image database is showing the strength and efficiency of the suggested chaotic image encryption for different images.  ...  There are various approaches for tracking objects:  Motion-based tracking  Recognition-based tracking 4.  ... 
doi:10.31695/ijerat.2021.3703 fatcat:mhovnj7hfbbuxn2in2hcffna6e

Video Forgery Detection: A Comprehensive Study of Inter and Intra Frame Forgery With Comparison of State-Of-Art

Et al. Sumaiya Shaikh
2023 International Journal on Recent and Innovation Trends in Computing and Communication  
IV SUMMARY OF VIDEO FORGERY DETECTION TECHNIQUES LIKED TO DEEPFAKE AND PIXEL MOTION DETECTION [60] Object GMM Self Could not find Tracking long distance and object [61] Detection Object Tracking and Contrast  ...  This author has introduced some common attacks where region splicing attack is registered as external objects are injected into existing frames.  ... 
doi:10.17762/ijritcc.v11i9.9130 fatcat:afnzgvwofvc4thjrr6xrnjvwsq

CAN ID Shuffling Technique(CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN

Samuel Woo, Daesung Moon, Taek-young Youn, Yousik Lee, Yongeun Kim
2019 IEEE Access  
New vehicles have become increasingly targeted for cyber-attacks as their rate of digitalization is accelerated.  ...  an attack.  ...  They performed an experiment to track the location of a vehicle using the vulnerabilities of Android OS for vehicles. B.  ... 
doi:10.1109/access.2019.2892961 fatcat:t6c675ffyvdplltffcwpeyx45e

Advances in adversarial attacks and defenses in computer vision: A survey [article]

Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah
2021 arXiv   pre-print
However, it is now known that DL is vulnerable to adversarial attacks that can manipulate its predictions by introducing visually imperceptible perturbations in images and videos.  ...  Besides a comprehensive literature review, the article also provides concise definitions of technical terminologies for non-experts in this domain.  ...  Object detection and tracking Object detection and tracking are longstanding computer vision problems.  ... 
arXiv:2108.00401v2 fatcat:23gw74oj6bblnpbpeacpg3hq5y

Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, Selcuk Uluagac
2023 IEEE Security and Privacy  
In this work, we present a device-centric analysis of security and privacy attacks and defenses on Extended Reality (XR) devices, highlighting the need for robust and privacy-aware security mechanisms.  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers and special issue editors for their helpful feedback and time.  ...  Science Foundation (Awards: 2039606, 2219920), Cyber Florida, Microsoft, (ii) La Sapienza University of Rome within the Bando Ricerca 2020, project "Secure ANd PrivatE Information sharing (SAN-PEI)", and  ... 
doi:10.1109/msec.2023.3332004 fatcat:x6noadffebddfoiglljxqgndda

Secure, privacy-preserving and federated machine learning in medical imaging

Georgios A. Kaissis, Marcus R. Makowski, Daniel Rückert, Rickmer F. Braren
2020 Nature Machine Intelligence  
Passerat-Palmbach and the OpenMined project members for their support and critical appraisal, and B. Farkas for creating the article's illustration.  ...  Tabular data can be easily shuffled, but the perturbation of images can have unpredictable effects, with research demonstrating this type of manipulation (for example, adversarial noise) both as an attack  ...  tracking/audit trails using blockchains 48 ).  ... 
doi:10.1038/s42256-020-0186-1 fatcat:qpuygpf6ojcrlpqg6a5hbsdfyq

Event Encryption: Rethinking Privacy Exposure for Neuromorphic Imaging [article]

Pei Zhang and Shuo Zhu and Edmund Y. Lam
2023 arXiv   pre-print
Our evaluations show that the encrypted events can effectively protect information from attacks of low-level visual reconstruction and high-level neuromorphic reasoning, and thus feature dependable privacy-preserving  ...  The proposed solution gives impetus to the security of event data and paves the way to a highly encrypted technique for privacy-protective neuromorphic imaging.  ...  for the scenarios involving sensitive biometrics, such as facial expression tracking [10] and gait recognition [11] .  ... 
arXiv:2306.03369v1 fatcat:233nedm6pbd5lpvaoq64fsofne
« Previous Showing results 1 — 15 out of 2,906 results